mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-11-04 10:44:12 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			118 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			118 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2019 The Gitea Authors. All rights reserved.
 | 
						|
// SPDX-License-Identifier: MIT
 | 
						|
 | 
						|
package upload
 | 
						|
 | 
						|
import (
 | 
						|
	"mime"
 | 
						|
	"net/http"
 | 
						|
	"net/url"
 | 
						|
	"path"
 | 
						|
	"regexp"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"code.gitea.io/gitea/modules/log"
 | 
						|
	"code.gitea.io/gitea/modules/setting"
 | 
						|
	"code.gitea.io/gitea/services/context"
 | 
						|
)
 | 
						|
 | 
						|
// ErrFileTypeForbidden not allowed file type error
 | 
						|
type ErrFileTypeForbidden struct {
 | 
						|
	Type string
 | 
						|
}
 | 
						|
 | 
						|
// IsErrFileTypeForbidden checks if an error is a ErrFileTypeForbidden.
 | 
						|
func IsErrFileTypeForbidden(err error) bool {
 | 
						|
	_, ok := err.(ErrFileTypeForbidden)
 | 
						|
	return ok
 | 
						|
}
 | 
						|
 | 
						|
func (err ErrFileTypeForbidden) Error() string {
 | 
						|
	return "This file cannot be uploaded or modified due to a forbidden file extension or type."
 | 
						|
}
 | 
						|
 | 
						|
var wildcardTypeRe = regexp.MustCompile(`^[a-z]+/\*$`)
 | 
						|
 | 
						|
// Verify validates whether a file is allowed to be uploaded. If buf is empty, it will just check if the file
 | 
						|
// has an allowed file extension.
 | 
						|
func Verify(buf []byte, fileName, allowedTypesStr string) error {
 | 
						|
	allowedTypesStr = strings.ReplaceAll(allowedTypesStr, "|", ",") // compat for old config format
 | 
						|
 | 
						|
	allowedTypes := []string{}
 | 
						|
	for _, entry := range strings.Split(allowedTypesStr, ",") {
 | 
						|
		entry = strings.ToLower(strings.TrimSpace(entry))
 | 
						|
		if entry != "" {
 | 
						|
			allowedTypes = append(allowedTypes, entry)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if len(allowedTypes) == 0 {
 | 
						|
		return nil // everything is allowed
 | 
						|
	}
 | 
						|
 | 
						|
	fullMimeType := http.DetectContentType(buf)
 | 
						|
	mimeType, _, err := mime.ParseMediaType(fullMimeType)
 | 
						|
	if err != nil {
 | 
						|
		log.Warn("Detected attachment type could not be parsed %s", fullMimeType)
 | 
						|
		return ErrFileTypeForbidden{Type: fullMimeType}
 | 
						|
	}
 | 
						|
	extension := strings.ToLower(path.Ext(fileName))
 | 
						|
	isBufEmpty := len(buf) <= 1
 | 
						|
 | 
						|
	// https://developer.mozilla.org/en-US/docs/Web/HTML/Element/input/file#Unique_file_type_specifiers
 | 
						|
	for _, allowEntry := range allowedTypes {
 | 
						|
		if allowEntry == "*/*" {
 | 
						|
			return nil // everything allowed
 | 
						|
		}
 | 
						|
		if strings.HasPrefix(allowEntry, ".") && allowEntry == extension {
 | 
						|
			return nil // extension is allowed
 | 
						|
		}
 | 
						|
		if isBufEmpty {
 | 
						|
			continue // skip mime type checks if buffer is empty
 | 
						|
		}
 | 
						|
		if mimeType == allowEntry {
 | 
						|
			return nil // mime type is allowed
 | 
						|
		}
 | 
						|
		if wildcardTypeRe.MatchString(allowEntry) && strings.HasPrefix(mimeType, allowEntry[:len(allowEntry)-1]) {
 | 
						|
			return nil // wildcard match, e.g. image/*
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if !isBufEmpty {
 | 
						|
		log.Info("Attachment with type %s blocked from upload", fullMimeType)
 | 
						|
	}
 | 
						|
 | 
						|
	return ErrFileTypeForbidden{Type: fullMimeType}
 | 
						|
}
 | 
						|
 | 
						|
// AddUploadContext renders template values for dropzone
 | 
						|
func AddUploadContext(ctx *context.Context, uploadType string) {
 | 
						|
	switch uploadType {
 | 
						|
	case "release":
 | 
						|
		ctx.Data["UploadUrl"] = ctx.Repo.RepoLink + "/releases/attachments"
 | 
						|
		ctx.Data["UploadRemoveUrl"] = ctx.Repo.RepoLink + "/releases/attachments/remove"
 | 
						|
		ctx.Data["UploadLinkUrl"] = ctx.Repo.RepoLink + "/releases/attachments"
 | 
						|
		ctx.Data["UploadAccepts"] = strings.ReplaceAll(setting.Repository.Release.AllowedTypes, "|", ",")
 | 
						|
		ctx.Data["UploadMaxFiles"] = setting.Attachment.MaxFiles
 | 
						|
		ctx.Data["UploadMaxSize"] = setting.Attachment.MaxSize
 | 
						|
	case "comment":
 | 
						|
		ctx.Data["UploadUrl"] = ctx.Repo.RepoLink + "/issues/attachments"
 | 
						|
		ctx.Data["UploadRemoveUrl"] = ctx.Repo.RepoLink + "/issues/attachments/remove"
 | 
						|
		if len(ctx.PathParam("index")) > 0 {
 | 
						|
			ctx.Data["UploadLinkUrl"] = ctx.Repo.RepoLink + "/issues/" + url.PathEscape(ctx.PathParam("index")) + "/attachments"
 | 
						|
		} else {
 | 
						|
			ctx.Data["UploadLinkUrl"] = ctx.Repo.RepoLink + "/issues/attachments"
 | 
						|
		}
 | 
						|
		ctx.Data["UploadAccepts"] = strings.ReplaceAll(setting.Attachment.AllowedTypes, "|", ",")
 | 
						|
		ctx.Data["UploadMaxFiles"] = setting.Attachment.MaxFiles
 | 
						|
		ctx.Data["UploadMaxSize"] = setting.Attachment.MaxSize
 | 
						|
	case "repo":
 | 
						|
		ctx.Data["UploadUrl"] = ctx.Repo.RepoLink + "/upload-file"
 | 
						|
		ctx.Data["UploadRemoveUrl"] = ctx.Repo.RepoLink + "/upload-remove"
 | 
						|
		ctx.Data["UploadLinkUrl"] = ctx.Repo.RepoLink + "/upload-file"
 | 
						|
		ctx.Data["UploadAccepts"] = strings.ReplaceAll(setting.Repository.Upload.AllowedTypes, "|", ",")
 | 
						|
		ctx.Data["UploadMaxFiles"] = setting.Repository.Upload.MaxFiles
 | 
						|
		ctx.Data["UploadMaxSize"] = setting.Repository.Upload.FileMaxSize
 | 
						|
	}
 | 
						|
}
 |